<!-- 
RSS generated by JIRA (8.20.10#820010-sha1:ace47f9899e9ee25d7157d59aa17ab06aee30d3d) at Wed Feb 07 19:08:28 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>OpenDaylight JIRA</title>
    <link>https://jira.opendaylight.org</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>8.20.10</version>
        <build-number>820010</build-number>
        <build-date>22-06-2022</build-date>
    </build-info>


<item>
            <title>[AAA-40] [SECURITY] SQLite: memory corruption leading to DoS and possible code execution CVE-2015-3414 and CVE-2015-3416</title>
                <link>https://jira.opendaylight.org/browse/AAA-40</link>
                <project id="10102" key="AAA">aaa</project>
                    <description>&lt;p&gt;The Helium release of AAA uses SQL statements prepared using string concatenation of user-supplied variables. This theoretically exposes an SQL injection vulnerability, but testing has revealed no cases that could cross a trust boundary and be useful to an attacker. However, as a result of allowing users to directly manipulate SQL statements, AAA exposes two underlying vulnerabilities in SQLite:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3414&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3414&lt;/a&gt;&lt;br/&gt;
&lt;a href=&quot;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3416&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3416&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another vulnerability in SQLite was also reported:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3415&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3415&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But AAA does not expose this vulnerability, because it relies on injection of DDL and AAA only allows an attacker to inject DML.&lt;/p&gt;

&lt;p&gt;To resolve these vulnerabilities, we need to either switch to using prepared statements, or upgrade SQLite to a patched version, preferably both. The Lithium release uses prepared statements and is not vulnerable.&lt;/p&gt;</description>
                <environment>&lt;p&gt;Operating System: All&lt;br/&gt;
Platform: All&lt;/p&gt;</environment>
        <key id="22291">AAA-40</key>
            <summary>[SECURITY] SQLite: memory corruption leading to DoS and possible code execution CVE-2015-3414 and CVE-2015-3416</summary>
                <type id="10104" iconUrl="https://jira.opendaylight.org/secure/viewavatar?size=xsmall&amp;avatarId=10303&amp;avatarType=issuetype">Bug</type>
                                                <status id="5" iconUrl="https://jira.opendaylight.org/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="green"/>
                                    <resolution id="10000">Done</resolution>
                                        <assignee username="-1">Unassigned</assignee>
                                    <reporter username="david.jorm@gmail.com">David Jorm</reporter>
                        <labels>
                    </labels>
                <created>Wed, 24 Jun 2015 23:06:07 +0000</created>
                <updated>Thu, 21 Mar 2019 11:56:41 +0000</updated>
                            <resolved>Thu, 25 Jun 2015 17:25:10 +0000</resolved>
                                                                    <component>General</component>
                        <due></due>
                            <votes>0</votes>
                                    <watches>1</watches>
                                                                                                                <comments>
                            <comment id="42202" author="david.jorm@gmail.com" created="Wed, 24 Jun 2015 23:32:12 +0000"  >&lt;p&gt;Patch upgrading SQLite: &lt;a href=&quot;https://git.opendaylight.org/gerrit/#/c/23216/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://git.opendaylight.org/gerrit/#/c/23216/&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="42203" author="rgoulding" created="Thu, 25 Jun 2015 17:25:10 +0000"  >&lt;p&gt;The following resolves the PreparedStatements issue:&lt;br/&gt;
&lt;a href=&quot;https://git.opendaylight.org/gerrit/#/c/23281/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://git.opendaylight.org/gerrit/#/c/23281/&lt;/a&gt;&lt;/p&gt;</comment>
                    </comments>
                    <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                            <customfield id="customfield_11400" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                        <customfield id="customfield_10208" key="com.atlassian.jira.plugin.system.customfieldtypes:textfield">
                        <customfieldname>External issue ID</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>3856</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10201" key="com.atlassian.jira.plugin.system.customfieldtypes:url">
                        <customfieldname>External issue URL</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue><![CDATA[https://bugs.opendaylight.org/show_bug.cgi?id=3856]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10206" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Issue Type</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10300"><![CDATA[Bug]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10000" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>0|i023q7:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>